<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Strange NMAP behavior in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/strange-nmap-behavior/m-p/3902353#M470771</link>
    <description>&lt;P&gt;We recently upgraded from 1.3 (no nmap probe option available) to 2.1 (defaults to policy nodes having nmap probe enabled).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Long story short - it's profiled a bunch of our devices improperly as cisco-router. Xerox &amp;amp; Ricoh printers, some apple devices, etc. Seems random. Apparently it gathered info that the device is a Cisco 3925 running this version IOS, or a 6506 running that version IOS...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How exactly does NMAP determine OS version? The probe description mentions it looks for open ports and OS version. Surely it relies on more then just open ports to determine a specific version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;operating-system&lt;/TD&gt;&lt;TD&gt;Cisco 6506 router (IOS 12.2)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;operating-system-result&lt;/TD&gt;&lt;TD&gt;Cisco 6506 router (IOS 12.2)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;operating-system&lt;/TD&gt;&lt;TD&gt;Cisco 2811 router (IOS 12.2 - 12.4) (accuracy 95%)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;operating-system-result&lt;/TD&gt;&lt;TD&gt;Cisco 2811 router (IOS 12.2 - 12.4) (accuracy 95%)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
    <pubDate>Fri, 02 Aug 2019 22:12:44 GMT</pubDate>
    <dc:creator>Y C</dc:creator>
    <dc:date>2019-08-02T22:12:44Z</dc:date>
    <item>
      <title>Strange NMAP behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/strange-nmap-behavior/m-p/3902353#M470771</link>
      <description>&lt;P&gt;We recently upgraded from 1.3 (no nmap probe option available) to 2.1 (defaults to policy nodes having nmap probe enabled).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Long story short - it's profiled a bunch of our devices improperly as cisco-router. Xerox &amp;amp; Ricoh printers, some apple devices, etc. Seems random. Apparently it gathered info that the device is a Cisco 3925 running this version IOS, or a 6506 running that version IOS...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How exactly does NMAP determine OS version? The probe description mentions it looks for open ports and OS version. Surely it relies on more then just open ports to determine a specific version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;operating-system&lt;/TD&gt;&lt;TD&gt;Cisco 6506 router (IOS 12.2)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;operating-system-result&lt;/TD&gt;&lt;TD&gt;Cisco 6506 router (IOS 12.2)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;operating-system&lt;/TD&gt;&lt;TD&gt;Cisco 2811 router (IOS 12.2 - 12.4) (accuracy 95%)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;operating-system-result&lt;/TD&gt;&lt;TD&gt;Cisco 2811 router (IOS 12.2 - 12.4) (accuracy 95%)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Fri, 02 Aug 2019 22:12:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/strange-nmap-behavior/m-p/3902353#M470771</guid>
      <dc:creator>Y C</dc:creator>
      <dc:date>2019-08-02T22:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: Strange NMAP behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/strange-nmap-behavior/m-p/3902435#M470780</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;A href="https://www.comparitech.com/net-admin/the-definitive-guide-to-nmap/#OS_Scanning" target="_blank"&gt;https://www.comparitech.com/net-admin/the-definitive-guide-to-nmap/#OS_Scanning&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Aug 2019 09:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/strange-nmap-behavior/m-p/3902435#M470780</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2019-08-03T09:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: Strange NMAP behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/strange-nmap-behavior/m-p/3902447#M470783</link>
      <description>&lt;P&gt;Well, I guess what I should say is... regardless of what it uses, if it's this inaccurate what's the point? And the idea how it favors Cisco products is amusing. It's forgivable if it recognizes an ipad as an iphone... but a printer as a 6506? Really?&lt;/P&gt;</description>
      <pubDate>Sat, 03 Aug 2019 10:34:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/strange-nmap-behavior/m-p/3902447#M470783</guid>
      <dc:creator>Y C</dc:creator>
      <dc:date>2019-08-03T10:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: Strange NMAP behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/strange-nmap-behavior/m-p/3902491#M470787</link>
      <description>If not enough ports are open, there is something called an aggressive OS lookup that is done causing the misinterpretation of the operating system. ISE uses the operating system guess from nmap.org. It is an open source resource for nmap implementation.&lt;BR /&gt;</description>
      <pubDate>Sat, 03 Aug 2019 14:30:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/strange-nmap-behavior/m-p/3902491#M470787</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2019-08-03T14:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: Strange NMAP behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/strange-nmap-behavior/m-p/3903164#M470790</link>
      <description>&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;operating-system&lt;/TD&gt;&lt;TD&gt;Cisco Nexus 7000 switch (NX-OS 4.2.6) (accuracy 99%)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;operating-system-result&lt;/TD&gt;&lt;TD&gt;Cisco Nexus 7000 switch (NX-OS 4.2.6) (accuracy 99%)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's an apple device - so it thinks it's wild guess was 99% accurate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sounds like turning it off was the right thing to do. It's a surprise this is enabled by default if it's known wild guesses like this can happen.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 15:17:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/strange-nmap-behavior/m-p/3903164#M470790</guid>
      <dc:creator>Y C</dc:creator>
      <dc:date>2019-08-05T15:17:44Z</dc:date>
    </item>
  </channel>
</rss>

